[go: up one dir, main page]

Nusair, 2023 - Google Patents

Smart Home Cybersecurity Challenges: An Assessment of End-User Knowledge and a Training Solution to Mitigate These Challenges

Nusair, 2023

Document ID
7675683577222904501
Author
Nusair A
Publication year

External Links

Snippet

As the digital revolution unfolds, individuals are increasingly transforming their traditional homes into smart homes, adopting semi-and fully automated smart devices. This transformative shift, fueled by advancements in information technology, presents vast social …
Continue reading at search.proquest.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/30286Information retrieval; Database structures therefor; File system structures therefor in structured data stores
    • G06F17/30587Details of specialised database models

Similar Documents

Publication Publication Date Title
Slupska et al. Threat modeling intimate partner violence: Tech abuse as a cybersecurity challenge in the internet of things
Zeng et al. End user security and privacy concerns with smart homes
Weichbroth et al. Mobile security: Threats and best practices
Almutairi et al. Investigation of smart home security and privacy: Consumer perception in saudi arabia
Heartfield et al. Protection against semantic social engineering attacks
Kaushik et al. Advanced Techniques and Applications of Cybersecurity and Forensics
Goh Humans as the weakest link in maintaining cybersecurity: Building cyber resilience in humans
Corman The Human Element in Cybersecurity–Bridging the Gap Between Technology and Human Behaviour
Kessler Effectiveness of the protection motivation theory on small business employee security risk behavior
Wingreen et al. Information Technology Security and Risk Management: Inductive Cases for Information Security
Maier et al. Surveillance Disguised as Protection: A Comparative Analysis of Sideloaded and In-Store Parental Control Apps
Boye Understanding cyberrisks in IoT: When smart things turn against you
Mitchell Cyber Security@ home: The effect of home user perceptions of personal security performance on household IoT security intentions
Chhetri Designing for Privacy in Smart Home Devices
Nusair Smart Home Cybersecurity Challenges: An Assessment of End-User Knowledge and a Training Solution to Mitigate These Challenges
Lopes et al. Common techniques, success attack factors and obstacles to social engineering: a systematic literature review
Wright The use and acceptance of the Internet of Things (IoT) by American consumers
Raburn Exploring why consumers do not use current cybersecurity mitigation strategies for IoT smart devices in the home
Nthala Home data security decisions
Bhargava et al. Beyond the Classroom: A Comprehensive Guide to Wearable Device Security in Education
Aiden et al. Social Engineering Attacks: Detection and Prevention
Castleberry et al. Attack Scenarios Relating to Army Facility-Related Control Systems: Quantifying the Cost to Secure and Cost Savings of the Army’s FRCS Program
Hassan et al. Demonstration of cyber security through Penetration testing on IP camera
Shorts Navigating the Maze: The Effectiveness of Manufacturer Support in Applying User-Controlled Security and Privacy Features
Williams The socialization of secure computing practices for home internet users: A quantitative analysis of individual perceptions